Network Security Services (NSS) 3.15.5 is a patch release for NSS 3.15. The bug fixes in NSS 3.15.5 are described in the "Bugs Fixed" section below.
The HG tag is NSS_3_15_5_RTM. NSS 3.15.5 requires NSPR 4.10.2 or newer.
NSS 3.15.5 source distributions are also available on ftp.mozilla.org for secure HTTPS download:
- Added support for the TLS application layer protocol negotiation (ALPN) extension. Two SSL socket options,
SSL_ENABLE_ALPN, can be used to control whether NPN or ALPN (or both) should be used for application layer protocol negotiation.
- Added the TLS padding extension. The extension type value is 35655, which may change when an official extension type value is assigned by IANA. NSS automatically adds the padding extension to ClientHello when necessary.
- Added a new macro
CERT_LIST_TAIL, defined in
certt.h, for getting the tail of a
- Bug 950129: Improve the OCSP fetching policy when verifying OCSP responses
- Bug 949060: Validate the
iovinput argument (an array of
PR_Writev). Applications should still take care when converting
iov_lenmembers of the two structures have different types (
size_tis unsigned and may be larger than
A complete list of all bugs resolved in this release can be obtained at https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&target_milestone=3.15.5&product=NSS
NSS 3.15.5 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.15.5 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).